-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Using the EС algorithm in Nss provider gives an error when creating the CSR #177
Comments
There is an error. |
@OleksandrSPV Try on the current tools. Maybe this provider doesn't support EС algorithm. |
You are right @donskov |
I conducted some research on the issue of saving CSR to a token, and here is what I found: When we copy a CSR to the token using https://github.com/servo/nss/blob/master/lib/softoken/pkcs11u.c#L1544C1-L1552 This function, in turn, uses https://github.com/servo/nss/blob/master/lib/softoken/pkcs11u.c#L1489-L1536 Interestingly, even if we find and fix the erroneous attribute, we will encounter another error, Here is the switch..case statement indicating the supported object types: https://github.com/servo/nss/blob/master/lib/softoken/pkcs11u.c#L1504-L1533 Therefore, it appears that we should not allow saving CSR to the token for the NSS provider. Ideally, to avoid such issues across different providers and applications, we need to extend the Fortify API to provide more information about the provider's capabilities. However, this is a significant task that requires careful planning and implementation. For now, I suggest implementing a check at the client level. Currently, the client can obtain a relatively consistent provider name, which offers a high probability of identifying the provider. For example, Something like this: const PROVIDER_LIMIT = {
'Firefox NSS': ['csr:save'],
} This approach will help us manage provider-specific limitations until we can implement a more comprehensive solution in the Fortify API. |
The text was updated successfully, but these errors were encountered: